Lines Matching +full:de +full:- +full:activated

18 .\" Set up some character translations and predefined strings.  \*(-- will
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
61 . de IX
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
104 . \" troff and (daisy-wheel) nroff accents
123 . ds d- d\h'-1'\(ga
124 . ds D- D\h'-1'\(hy
134 .TH EVP_KDF 3ossl "2023-09-19" "3.0.11" "OpenSSL"
149 EVP_KDF_CTX_gettable_params, EVP_KDF_CTX_settable_params \- EVP KDF routines
192 The \s-1EVP KDF\s0 routines are a high-level interface to Key Derivation Function
193 algorithms and should be used instead of algorithm-specific functions.
195 After creating a \fB\s-1EVP_KDF_CTX\s0\fR for the required algorithm using
202 \&\fB\s-1EVP_KDF\s0\fR is a type that holds the implementation of a \s-1KDF.\s0
204 \&\fB\s-1EVP_KDF_CTX\s0\fR is a context type that holds the algorithm inputs.
207 \&\fBEVP_KDF_fetch()\fR fetches an implementation of a \s-1KDF\s0 \fIalgorithm\fR, given
209 See \*(L"\s-1ALGORITHM FETCHING\*(R"\s0 in \fBcrypto\fR\|(7) for further information.
211 See \*(L"Key Derivation Function (\s-1KDF\s0)\*(R" in \fBOSSL_PROVIDER\-default\fR\|(7) for the lis…
218 \&\s-1KDF.\s0
221 \&\s-1NULL\s0 is a valid parameter, for which this function is a no-op.
224 \&\fBEVP_KDF_CTX_new()\fR creates a new context for the \s-1KDF\s0 implementation \fIkdf\fR.
226 \&\fBEVP_KDF_CTX_free()\fR frees up the context \fIctx\fR. If \fIctx\fR is \s-1NULL,\s0 nothing
229 \&\fBEVP_KDF_CTX_kdf()\fR returns the \fB\s-1EVP_KDF\s0\fR associated with the context
265 \&\fBEVP_KDF_gettable_params()\fR returns an \s-1\fBOSSL_PARAM\s0\fR\|(3) array that describes
270 return constant \s-1\fBOSSL_PARAM\s0\fR\|(3) arrays that describe the retrievable
277 constant \s-1\fBOSSL_PARAM\s0\fR\|(3) arrays that describe the settable parameters that
285 of output and \fB\s-1SIZE_MAX\s0\fR otherwise. If an error occurs then 0 is returned.
295 \&\fBEVP_KDF_do_all_provided()\fR traverses all \s-1KDF\s0 implemented by all activated
300 \&\fBEVP_KDF_get0_name()\fR return the name of the given \s-1KDF.\s0 For fetched KDFs
316 Some \s-1KDF\s0 implementations require a password.
317 For those \s-1KDF\s0 implementations that support it, this parameter sets the password.
321 Some \s-1KDF\s0 implementations can take a non-secret unique cryptographic salt.
322 For those \s-1KDF\s0 implementations that support it, this parameter sets the salt.
328 Some \s-1KDF\s0 implementations require an iteration count.
329 For those \s-1KDF\s0 implementations that support it, this parameter sets the
347 For \s-1KDF\s0 implementations that use an underlying computation \s-1MAC,\s0 digest or
358 Some \s-1KDF\s0 implementations require a key.
359 For those \s-1KDF\s0 implementations that support it, this octet string parameter
364 Some \s-1KDF\s0 implementations, such as \s-1\fBEVP_KDF\-HKDF\s0\fR\|(7), take an 'info' parameter
366 to application\- and context-specific information.
373 Used by implementations that use a \s-1MAC\s0 with a variable output size (\s-1KMAC\s0).
374 For those \s-1KDF\s0 implementations that support it, this parameter
375 sets the \s-1MAC\s0 output size.
382 Memory-hard password-based \s-1KDF\s0 algorithms, such as scrypt, use an amount of
384 For those \s-1KDF\s0 implementations that support it, this \fBuint64_t\fR parameter sets
394 \&\fBEVP_KDF_fetch()\fR returns a pointer to a newly fetched \fB\s-1EVP_KDF\s0\fR, or
395 \&\s-1NULL\s0 if allocation failed.
397 \&\fBEVP_KDF_get0_provider()\fR returns a pointer to the provider for the \s-1KDF,\s0 or
398 \&\s-1NULL\s0 on error.
403 \&\fB\s-1EVP_KDF_CTX\s0\fR structure or \s-1NULL\s0 if an error occurred.
407 \&\fBEVP_KDF_CTX_get_kdf_size()\fR returns the output size. \fB\s-1SIZE_MAX\s0\fR is returned to i…
410 \&\fBEVP_KDF_get0_name()\fR returns the name of the \s-1KDF,\s0 or \s-1NULL\s0 on error.
416 failure. In particular, a return value of \-2 indicates the operation is not
417 supported by the \s-1KDF\s0 algorithm.
420 The \s-1KDF\s0 life-cycle is described in \fBlife_cycle\-kdf\fR\|(7). In the future,
422 not be considered a breaking change to the \s-1API.\s0
425 \&\*(L"Key Derivation Function (\s-1KDF\s0)\*(R" in \fBOSSL_PROVIDER\-default\fR\|(7),
426 \&\fBlife_cycle\-kdf\fR\|(7).
432 Copyright 2019\-2023 The OpenSSL Project Authors. All Rights Reserved.
436 in the file \s-1LICENSE\s0 in the source distribution or at